Abstract
To detect replica nodes in a wireless sensor network, we propose a distributed, deterministic and resilient (DDR) replica detection protocol developed from a witness node based strategy. In DDR, while a location claim message of each node is sent towards the designated verification location in the network, the consistency of the messages is verified at intermediate nodes en route to its final destination. Compared with previous replication attack detection protocols, DDR achieves better computation and communication performance due to the use of symmetric key cryptography only and early replica detection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kim, C., Shin, S., Park, C., Yoon, H.: A Resilient and Efficient Replication Attack Detection Scheme for Wireless Sensor Networks. IEICE Trans. on Letter, E92-D 7, 1479–1483 (2009)
Becher, A., Benenson, Z.: Maximillian Dornseif: Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. Security in Pervasive Computing, 104–118 (2006)
Parno, B., Perrig, A., Gligor, V.: Distributed detection of node replication attacks in sensor networks. In: Proc. of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), pp. 49–63 (2005)
Conti, M., Pietro, R.D., Mancini, L.V.: A Randomized, Efficient, and Distributed protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks. In: Proc. of the 8th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc 2007), pp. 80–89 (2007)
Zhu, B., Addada., V.G.K., Setia., S., Jajodia., S., Roy., S.: Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. In: Computer Security Applications Conference (ACSAC 2007), pp. 257–267 (2007)
Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy analysis of public key cryptography for wireless sensor networks. In: Proc. of the Third IEEE International Conference on Pervasive Computing and Communications (PERCOM 2005), pp. 324–328 (2005)
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: Proc. of the 10th ACM Conference on Computer and Communication Security (CCS 2003), pp. 62–72 (2003)
Karp, B., Kung, H.T.: GPSR: Greedy Perimeter Stateless Routing for Wireless Networks. In: Proc. of the 6th ACM International Conference on Mobile Computing and Networking (MobiCom 2000), pp. 243–254 (2000)
Kaplan, E.D.: Understanidng GPS: Principles and Applications. Artech House, Boston, MA (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, C., Park, C., Hur, J., Lee, H., Yoon, H. (2009). A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks. In: Ślęzak, D., Kim, Th., Chang, A.CC., Vasilakos, T., Li, M., Sakurai, K. (eds) Communication and Networking. FGCN 2009. Communications in Computer and Information Science, vol 56. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10844-0_47
Download citation
DOI: https://doi.org/10.1007/978-3-642-10844-0_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10843-3
Online ISBN: 978-3-642-10844-0
eBook Packages: Computer ScienceComputer Science (R0)